Identification and Punishment Policies For Spectrum Sensing Data Falsification Attackers Using Delivery-Based Assessment
Identification and Punishment Policies For Spectrum Sensing Data Falsification Attackers Using Delivery-Based Assessment
discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/283351905
READS
53
3 AUTHORS, INCLUDING:
Saud Althunibat
Fabrizio Granelli
31 PUBLICATIONS 93 CITATIONS
SEE PROFILE
SEE PROFILE
is very large.
I. I NTRODUCTION
This
2010-264759).
ted. However, permission to use this material for any other purposes
November 1, 2015
DRAFT
November 1, 2015
DRAFT
energy efficiency.
knowledge.
the CRN.
marized as follows
(worst-case scenario).
honest users.
policy.
Section VII.
1 used,
Ui =
0 unused,
if
PN
if
PN
n=1
un,i K
(1)
Pe = P0 PF + P1 (1 PD )
(2)
A. Attacker Model
November 1, 2015
DRAFT
Fig. 1.
attackers
flips its own local decision and reports it to the FC. Such
Pdn = Pm (1
ac
Pdn
)
Pf n = Pm (1
Pfacn )
A
and PFA , respectively.
global decision of attackers by PD
+ (1
ac
Pm )Pdn
(3)
+ (1
Pm )Pfacn
(4)
ac
where Pdn
and Pfacn represent the actual (honest) detection
For the sake of simplicity, let us assume that all honest CUs are identical in their sensing performance, i.e.,
Pdn = Pdh and Pf n = Pf h . Likewise, the attackers are
considered to have identical performance, i.e., Pdn = Pda
and Pf n = Pf a .
spectrum occupancy.
2) Each attacker will individually decide to send a false
report or not (attack or not) with a probability Pm .
a) If an attacker has decided to attack, it will
invert its local decision and report it to the FC.
put of the honest CUs, the attacker will exploit the case of
November 1, 2015
DRAFT
in this round.
in this round.
Notice that the cooperation among attackers assumed
in this paper is different from other assumptions in the
C. An example
equal to 0.1 and 0.8, respectively. Fig. 2-a shows the error
in CRNs.
November 1, 2015
DRAFT
8
(a)
10
mission phase in order to formalize a performance indicator for each CU, which can be further employed to identify
10
10
10
(b)
2500
Throughput [bits]
2000
1500
1000
500
4
6
The number of attackers (M)
10
Fig. 2. Example: (a) the error probability versus the number of attackers,
the FC. Another option which can verify the data delivery
In the following sections, we describe two novel policies, attacker-identification policy and attacker-punishment
policy. Both of them are developed based on the deliverybased assessment approach. While attacker-identification
policy aims at detecting attackers and ignoring their reported local decision in the fusion process, the attackerpunishment policy is basically a scheduling policy that
leads to a proportional resource distribution according to
the evaluated individual performance of each CU. Such a
fair scheduling policy acts as a punishment for attackers
DRAFT
tion, as follows
IV. ATTACKER -I DENTIFICATION P OLICY
P rob.{Bn,T = b} =
T b
(1 n )T b
b n
(6)
follows
n = P (Bn,i = Bn,i1 + 1)
= P (H0 un,i = 1 Ui = 0)
P (H0 un,i = 1 Ui = 0) =
= P (H0 )P (un,i = 1|H0 )P (Ui = 0|un,i = 1 H0 )
= P0 Pf n P (Ui = 0|un,i = 1H0 )
(9)
Bn,i1 ,
Otherwise
(5)
follows
n = P0 Pf n P (Ui = 0|un,i = 1 H0 )
DRAFT
10
Bn,T = T n
(18)
in (11)
Also, if we denote the ignoring threshold by , the
ignoring probability of the nth CU can be expressed as
P (Ui = 0|un,i = 1 H0 )
1
N
1
X
a2
X
follows:
honest
f (j, M, Pf a )f (k j, H 1, Pf h ) (12)
Pign,n P rob.{Bn,T } =
b=
k=K1 j=a1
bn (1 n )T b
(19)
P (Ui = 0|un,i = 0 H1 )
a2
N
1 X
X
T
X
T
=
honest
after T CSS rounds, i.e. those CUs that have not been
k=K j=a1
NT = N
N
X
n=1
(20)
[41], as follows
f (, , ) =
(1 )
(14)
probabilities in (11)
N
1
X
a4
X
attacker
k=K1 j=a3
P (Ui = 0|un,i = 0 H1 )
1
a4
N
1 X
X
attacker
k=K j=a3
T
X
b P rob.{Bn,T = b} =
b=0
T
X
b=0
November 1, 2015
T b
(1 n )T b
b n
b
b h
b=
b=
(22)
(21)
(17)
11
follows
Pigna
Pignh
scenario as follows
T
= Pigna (+1)Pigna () =
(1a )T
(28)
P (Ui = 0|un,i = 1 H0 ) 0
a
wc
(23)
(29)
P (Ui = 0|un,i = 0 H1 ) 1
T
wc
= Pignh (+1)Pignh () =
h (1h )T
(Pigna Pignh ) =
T
T
a (1 a )T +
(1 h )T = 0
(25)
The binomial coefficients can be canceled, and the equation can be rearranged as follows
T
a (1 h )
1 h
=
h (1 a )
1 a
wc
wc
P1 (1 Pdh )
(30)
P1 (1 Pda )
(31)
case scenario.
= T
(27)
h)
ln ah(1
(1a )
)
(wc
wc T
da )(P0 +P1 Pdh )
ln (1P
(1Pdh )(P0 +P1 Pda )
(32)
November 1, 2015
DRAFT
12
(36)
Consequently, using the average value of Bn,i given in
(18), the average value of Psn at the ith round can be
easily derived as follows
Psn = PN
j=1
i P (Ui = 0) i j
=
P (Ui = 0) n
PN
N P (Ui = 0) j=1 j
i P (Ui = 0) i n
(37)
xi Bn,i
Psn = PN
j=1 (xi Bj,i )
(33)
xi =
xi1 + 1,
if Ui = 0
xi1 ,
if Ui = 1
Dh = P0 (1 PF )R Tt Psh
(38)
(34)
(35)
13
P (Ui = 0)
(40)
P1
(43)
wcI
follows
Ea = ess + P (Ui = 0)et Psa + P0 PF (1 PFA )
A
+ P1 PD (1 PD
) et (1/M ) (41)
where the first, the second and the third terms refer
to the energy consumed in spectrum sensing, legitimate
transmission and illegitimate transmission, respectively.
P1 P1 (1 Pdh )
N
P
M
P
1
1 (1 Pda ) HP1 (1 Pdh )
wcI
Pdh
M Pda + HPdh
(44)
Psh
As a comprehensive metric, the individual energy efficiency can be introduced as the ratio of the average
achievable throughput to the average energy consumption,
as follows
Psa
wcI
Pda
M Pda + HPdh
(45)
D
=
E
(42)
A. Worst-case scenario
global detection probability ( 1) and low global falsealarm probability ( 0) after removing attackers. By
P0 P f h
(46)
wcII
DRAFT
14
P0 Pf a
TABLE I
(47)
S IMULATION PARAMETERS
wcII
P (Ui = 0)
P0
(48)
Parameter
Value
Parameter
Value
wcII
P0
0.5
64 Kbps
Pdh
0.8
Tt
0.3 sec
Pf h
0.1
ess
11 mJ
Pda
0.1
et
0.5 J
Pf a
0.8
FR
Majority
A. Attacker-Identification Policy
and Pf h < Pf a .
R ESULTS
scenario.
The ignoring probability of attackers and honest CUs
versus the ignoring threshold for the proposed policy and
[14] is shown in Fig. 4 at M = 1 and in Fig. 5 at
M = 10. In both figures and for both types of CUs,
the ignoring probability is a decreasing function of .
Considering our proposal in both figures, at low values of
DRAFT
15
1
0.7
0.9
0.6
0.8
proposed policy
proposed policy
ignh
0.7
0.5
Ignoring probability
CounterIncrementing probability
0.4
0.3
igna
0.6
0.5
0.4
0.3
0.2
0.2
0.1
0.1
0
0
10
15
20
10
15
20
25
30
Ignoring threshold ()
25
Fig. 4.
which is the critical range, honest users will not exceed it,
0.5
0.4
0.3
0.2
0.1
0.6
0.7
Ignoring probability
10
15
20
25
30
Ignoring threshold ()
Fig. 5.
November 1, 2015
DRAFT
16
1
0.8
0.7
0.6
Pigna Pignh
T=10
T=20
T=30
0.9
0.5
0.4
0.3
0.2
majority.
10
15
20
25
30
Ignoring threshold ()
Fig. 7.
(Pigna ) and honest CUs (Pigna ) versus the ignoring threshold () for
different values of T . ( M = 1)
0.9
0.8
25
0.7
0.6
0.5
0.4
20
0.3
15
0.2
0.1
0
Fig. 6.
10
12
14
16
18
Ignoring threhold ( )
20
22
24
26
28
30
10
10
15
20
25
Fig. 8.
ignoring threshold ( ).
B. Attacker-Punishment Policy
November 1, 2015
DRAFT
17
x 10
2.5
1.5
0.5
11
13
15
17
19
attackers (i T ). (T = 30)
of i T .
November 1, 2015
DRAFT
18
4
x 10
3.5
x 10
2.5
1.5
2.5
1.5
0.5
0.5
Fig. 10.
10
15
20
25
30
11
13
15
17
19
Fig. 12.
x 10
VII. C ONCLUSIONS
2.5
tion attackers in infrastructure-based cognitive radio networks have been proposed. The first policy is an attacker-
1.5
0.5
Fig. 11.
10
15
20
Ignoring threshold ( )
25
30
November 1, 2015
Future work will include the evaluation of the performance of the proposed policies in presence of different
attackers strategies. Indeed, an open challenge for any
security policy is to consider the case when attackers may
learn from the outcome of their previous decisions and act
DRAFT
19
adaptively.
R EFERENCES
[1] FCC, Spectrum Policy Task Force Report (ET Docket no.02-135),
Nov. 2002.
[3] S. Haykin, Cognitive radio: brain-empowered wireless communications, IEEE Journal on Selected Areas in Communications, vol. 23,
no. 2, 2005, pp. 201-220.
[4] J. Wang, M. Ghosh, and K. Challapali, Emerging cognitive radio
applications: A survey, IEEE Communications Magazine, vol.49,
no.3, pp.74-81, March 2011.
[5] A. Ghasemi and E. S. Sousa, Spectrum sensing in cognitive radio
networks: requirements, challenges and design trade-offs, IEEE
Communications Magazine, vol.46, no.4, pp.32-39, April 2008.
[6] M. Di Renzo, L. Imbriglio, F. Graziosi and F. Santucci, Cooperative Spectrum Sensing over Correlated Log-Normal Sensing and
Reporting Channels, IEEE Global Telecommunications Conference
(GLOBECOM), 2009.
[7] A. Ghasemi and E. S. Sousa, Collaborative spectrum sensing for
opportunistic access in fading environments, IEEE International
Symposium on Dynamic Spectrum Access Network, Baltimore- USA,
November 2005.
[8] E. Axell, G. Leus, E. G. Larsson and H. V. Poor, Spectrum Sensing
for Cognitive Radio : State-of-the-Art and Recent Advances, IEEE
Signal Processing Magazine, vol.29, no.3, pp.101-116, May 2012.
[9] S. Althunibat, S. Narayanan, M. Di Renzo and F. Granelli,EnergyEfficient Partial-Cooperative Spectrum Sensing in Cognitive Radio
over Fading Channels, IEEE VTC-Spring, 2013.
[10] S. Wang, Y. Wang, J. P. Coon and A. Doufexi, Energy-efficient
spectrum sensing and access for cognitive radio networks, IEEE
Transactions on Vehicular Technology, vol. 61, no. 2, 2012, pp. 906912.
[11] A. G. Fragkiadakis, E. Z. Tragos and I. G. Askoxylakis, A Survey
no.1, 2013.
November 1, 2015
DRAFT
20
November 1, 2015
DRAFT